Table 25 Comparative analysis of security mechanisms in VANETs.

From: A hybrid deep learning model for detection and mitigation of DDoS attacks in VANETs

Criteria

Blockchain-Based

PKI-Based

Trust-Based

AI-Based IDS

Scalability

✗ (2/5)

✓ (4/5)

✓ (4/5)

Medium (3/5)

Latency

✗ (1/5)

✓ (4/5)

✓ (4/5)

Medium (3/5)

Tamper resistance

✓ (5/5)

Medium (3/5)

✗ (2/5)

✗ (2/5)

Trust management

✓ (4/5)

✗ (2/5)

✓ (5/5)

Medium (3/5)

Detection of unknown attacks

✗ (1/5)

✗ (1/5)

✗ (2/5)

✓ (5/5)

Explainability/transparency

✓ (4/5)

✓ (4/5)

✓ (4/5)

✗ (2/5)

Suitability for real-time use

✗ (1/5)

✓ (5/5)

✓ (4/5)

Medium (3/5)

Resource consumption

✗ (2/5)

✓ (5/5)

✓ (4/5)

✗ (2/5)

Resilience to sybil attacks

✓ (5/5)

✗ (2/5)

Medium (3/5)

✓ (4/5)

Overall security robustness

✓ (4/5)

Medium (3/5)

Medium (3/5)

✓ (5/5)